Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
Sound Blaster creative set-up.fix.exe
Resource
win7-20240704-en
Errors
General
-
Target
Sound Blaster creative set-up.fix.exe
-
Size
202KB
-
MD5
69e54877c8aee907efaad8e96ffa8bad
-
SHA1
fa005fa2f233fb07c0a58b06b0c88610164097a8
-
SHA256
83b491f66cbcc39a71daff3cb9f2e6228a77959aebdf6a87b4c95f884de588a4
-
SHA512
db4d864dd8ae525b48941491ff257e8eee64ba93cdf1e9fd96a21d124bc01dfe660fe9451a87cb306964c2966854a0626d5f777bb35aec47c83c5956f2f4b917
-
SSDEEP
3072:9nx83hRxFJiN09QcRD21e+/2EIjcvlCHQnDPvrcUPn6+byteiYD8+YdzNrj:FCxiN0f1fcvlCwnDbvytDYo7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation Sound Blaster creative set-up.fix.exe -
Executes dropped EXE 1 IoCs
pid Process 1004 dllhost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2024 sc.exe 5060 sc.exe 4924 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1016 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3860 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1004 4684 Sound Blaster creative set-up.fix.exe 84 PID 4684 wrote to memory of 1004 4684 Sound Blaster creative set-up.fix.exe 84 PID 4684 wrote to memory of 1004 4684 Sound Blaster creative set-up.fix.exe 84 PID 1004 wrote to memory of 320 1004 dllhost.exe 85 PID 1004 wrote to memory of 320 1004 dllhost.exe 85 PID 1004 wrote to memory of 320 1004 dllhost.exe 85 PID 320 wrote to memory of 3860 320 cmd.exe 87 PID 320 wrote to memory of 3860 320 cmd.exe 87 PID 320 wrote to memory of 3860 320 cmd.exe 87 PID 1004 wrote to memory of 684 1004 dllhost.exe 88 PID 1004 wrote to memory of 684 1004 dllhost.exe 88 PID 1004 wrote to memory of 684 1004 dllhost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sound Blaster creative set-up.fix.exe"C:\Users\Admin\AppData\Local\Temp\Sound Blaster creative set-up.fix.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\ProgramData\dllhost.exe"C:\ProgramData\dllhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.execmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc query windefend3⤵PID:684
-
C:\Windows\SysWOW64\sc.exesc query windefend4⤵
- Launches sc.exe
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop windefend3⤵PID:4712
-
C:\Windows\SysWOW64\sc.exesc stop windefend4⤵
- Launches sc.exe
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete windefend3⤵PID:2028
-
C:\Windows\SysWOW64\sc.exesc delete windefend4⤵
- Launches sc.exe
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im svchost.exe3⤵PID:2496
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svchost.exe4⤵
- Kills process with taskkill
PID:1016
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD569e54877c8aee907efaad8e96ffa8bad
SHA1fa005fa2f233fb07c0a58b06b0c88610164097a8
SHA25683b491f66cbcc39a71daff3cb9f2e6228a77959aebdf6a87b4c95f884de588a4
SHA512db4d864dd8ae525b48941491ff257e8eee64ba93cdf1e9fd96a21d124bc01dfe660fe9451a87cb306964c2966854a0626d5f777bb35aec47c83c5956f2f4b917
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82